Today is the second Tuesday of the month, making it Patch Tuesday. That means that Microsoft is releasing updates for all supported versions of Windows. The company also re-released the Windows 10 October 2018 Update today, so there's yet another supported version of the OS.

If you're already on the Windows 10 October 2018 Update, or version 1809, you're going to get KB4467708, which brings the build number to 17763.134. It can be manually downloaded here, and contains the following fixes:

Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).

Addresses an issue that prevents users from signing in to a Microsoft account (MSA) as a different user if signing in a second time.

Addresses an issue that denies file system access to Internet of Things (IoT) Universal Windows Platform (UWP) apps that require this capability.

Addresses an issue that causes the on-screen keyboard to appear when running automated tests or when you install a physical keyboard.

After installing this update, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with…command or Settings > Apps > Default apps.

In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

In some cases, attempting to set application defaults again will succeed.

Microsoft is working on a resolution and estimates a solution will be available in late November 2018.

If you're still on the Windows 10 April 2018 Update, as most people are, you'll get KB4467702, which brings the build number to 17134.407. You can manually download it here, and it contains the following fixes:

Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).

Addresses an issue that may prevent developer tools (F12) from starting in Microsoft Edge.

After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception. For more information about this issue, see the following article in the Microsoft Knowledge Base:

Microsoft is working on a resolution and will provide an update in an upcoming release.

After installing this update, some users cannot set Win32 program defaults for certain app and file type combinations using the Open with…command or Settings > Apps > Default apps.

In some cases, Microsoft Notepad or other Win32 programs cannot be set as the default.

In some cases, attempting to set application defaults again will succeed.

Microsoft is working on a resolution and estimates a solution will be available in late November 2018.

For those on the Windows 10 Fall Creators Update, or version 1709, you'll get KB4467686, which brings the build number to 16299.785. You can manually download it here, and it contains the following fixes:

Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).

After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception. For more information about this issue, see the following article in the Microsoft Knowledge Base:

Microsoft is working on a resolution and will provide an update in an upcoming release.

Windows 10 Mobile users on version 1709 will get KB4469220, which brings the build number to 15254.541. As usual, it contains the fixes found in today's 1703 cumulative update, which is for PCs and phones.

The Windows 10 version 1703 update is KB4467696, and that brings the build number to 15063.1446. This is for PCs on Windows 10 Enterprise and Education only, along with phones. All other versions of Windows 10 version 1703 are unsupported. You can manually download it here, and it contains the following fixes:

Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).

Next up is Windows 10 version 1607, which gets KB4467691, bringing the build number to 14393.2608. This is also for Enterprise and Education customers, but also for Long-term Servicing Branch (LTSC) customers, including Windows Server 2016. You can manually download it here, and it contains the following fixes:

Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance, follow the instructions in KB4072698. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).

After installing this update, installation and client activation of Windows Server 2019 and 1809 LTSC Key Management Service (KMS) (CSVLK) host keys do not work as expected.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After installing this update, Windows Server 2016 promotions that create non-root domains fail in forests in which optional features like Active Directory recycle have been enabled. The error is, “The replication operation encountered a database error”.

Use servers running Windows Server 2012 R2 or earlier to promote the first domain controller in a non-root domain until a resolution is available.

Microsoft is working on a resolution and will provide an update in an upcoming release.

After you install the August Preview of Quality Rollup or September 11, 2018 .NET Framework update, instantiation of SqlConnection can throw an exception. For more information about this issue, see the following article in the Microsoft Knowledge Base:

Microsoft is working on a resolution and will provide an update in an upcoming release.

Finally, those that are on the original version of Windows 10 will get KB4467680, bringing the build number to 10240.18036. This is only for LTSC customers. you can manually download it here, and it contains the following fixes:

Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).

Updates Venezuela currency information. This will affect the culture of “es-VE” as follows:

The currency symbol is “Bs.S”.

The English currency name is “Bolívar Soberano”.

The local currency name is “bolívar soberano”.

The International Currency Code is “VES”.

Addresses additional issues with updated time zone information.

Addresses an issue with navigation from the Decade view in the Japanese calendar. When the user tries to go from the Current era to the next era, navigation does not work properly.

Addresses an issue in the Universal CRT that sometimes causes the AMD64-specific implementation of FMOD to return an incorrect result when given very large inputs. FMOD is frequently used to implement the modulo operator in JavaScript and Python implementations that use the Universal C Runtime.

Addresses an issue with a handle leak that may occur in the lsm.exe process and in applications that call SCardEstablishContext or SCardReleaseContext. Once the leaked handle count reaches a certain threshold, smart card-based operations fail with the error, “SCARD_E_NO_SERVICE”.